Describe fundamental aspects of cloud computing

Assignment Help Computer Networking
Reference no: EM132514925

ITECH1102 Networking and Security - Federation University

Learning Outcome 1. Describe and explain the role and function of network connectivity in current computing.
Learning Outcome 2. Describe and explain the principles of communication in networks.
Learning Outcome 3. Describe the role and functionality of hardware and software entities that contribute to the network communications.
Learning Outcome 4. Describe and explain the protocols and interactions that implement network communications.
Learning Outcome 5. Describe fundamental aspects of cloud computing.
Learning Outcome 6. Apply networking architecture knowledge to analyze the networking needs of the business.

Network Planning Assignment

Overview

The main objectives of this assignment are:

• To help students gain a good understanding of the IP (Internet Protocol), which is the major underlying technology of the Internet.
• To help students to understand the importance of subnet and routing of IP address.
• To encourage students to conduct an independent investigation into IP related topics from books, the Internet and through practical investigation.

Scenario
You have been appointed as a Network System Administrator by the Australian government to allocate public IP Version 4 (IPv4) addresses and build a routing table for edge routers to connect the Australian states as shown in Figure 1.

The IPv4 is an exhaustive list of IPv4 addresses for current Internet users in the world. However, in this scenario, you have the liberty to use the entire available unreserved public IPv4 addresses for the Internet users in Australia.

1639_figure.jpg

Figure 1: Edge routers R1 - R6 connecting different Australian States

Task

The major task is to allocate the unreserved public IPv4 addresses to different states in Australia based on the number of Internet users in those states. The number of Internet users for each state is given below:

New South Wales (NSW) : 6 Million
Victoria (VIC) : 4 Million
Queensland (QLD) : 3 Million
Western Australia (WA) : 2 Million
South Australia (SA) : 1 Million
Tasmania (TAS) : 300 Thousand
Northern Territory (NT) : 150 Thousand

The task needs to be completed based on the following constraints and assumptions:

• Only unreserved public IPv4 addresses should be used for allocation.
• Each state should have a unique set of addresses - no address or set of addresses can be reassigned to any other state.
• You should use only the classless IPv4 addressing in the assignment.
• The number of allocated addresses for each state should not exceed by 20% of the specified Internet users for that particular state. For instance, the assigned addresses for Tasmania should not exceed 360 Thousand addresses.
• It is allowed to use one or more subnets to achieve the number of required address for a given state.

The minor task is to create a routing table for edge routers only for the state NT, WA and SA. The task needs to be completed based on the following constraints and assumptions:

• The routing table should be minimal with no redundant routes in the table.
• Any packets from the source (NT or WA or SA) should take the minimal route to reach the destination (NT or WA or SA).
• Identify the Network Interface Card address to connect NT, WA and SA.

Attachment:- Network Planning Assignment.rar

Reference no: EM132514925

Questions Cloud

How should awareness of developmental theories guide work : How should our awareness of developmental theories guide our work as administrators? How should theory influence the implementation of quality programming.
Determine if the antisense drug lowered the cholesterol : Test to determine if the antisense drug lowered the cholesterol using a = 0.01 and the prob-value approach.
Inappropriate means for determining that nixon : CNN (the mortal enemy of Fox) does not believe this information. They believe that Fox used inappropriate means for determining that Nixon will win.
Feet and the distribution of heights : Corn plants grow to a mean height of 6.43 feet with a standard deviation of 0.15 feet and the distribution of heights is approximately normal.
Describe fundamental aspects of cloud computing : Describe and explain the protocols and interactions that implement network communications and Describe fundamental aspects of cloud computing.
What is the probability that no units are in the system : What is the probability that no units are in the system? If required, round your answer to four decimal places.
What is the average waiting time in minutes : What is the average waiting time in minutes before service begins? If required, round your answer to four decimal places.
Random samples of the same sample size : Assume 50 random samples of the same sample size are taken from a population, and a 90% confidence interval is constructed from each sample.
Estimate the number of pistons in the sample : A machine that manufactures automobile pistons 1% is estimated to produce a defective piston of the time. Suppose that this estimate is correct

Reviews

Write a Review

Computer Networking Questions & Answers

  Classifying the signal

You are provided with some continuous signals for the number of sensors on a sensor array. The signals detect various categories of signals.

  Tcp/ip protocol

After reviewing the concepts, pictorially model the TCP/IP protocol against the 7-layer OSI model. In your depiction, include the common protocol sections that fit in the various levels.

  The legality and exploitation of international mitm attacks

The legality and exploitation of international MiTM attacks (Individual Paper), ou will write a paper on this topic. Choose one of the MiTM cases discussed in this Week's lecture notes

  Have you experienced any kind of attack on the networks

Have you, your friends, your family, or place of employment experienced any kind of attack on the networks? If yes, please give us as much detail as possible.

  What is a packet and what is packet switching

What is a packet? What is packet switching

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Describe the type of business in which intel operates

What type of audit opinion was given for the financial statements and the internal financial controls of Intel? Explain the key items discussed in the audit.

  Compare to the minimum recommendations for windows

Identify the professor type, processor speed, RAM, and hard disk space - How do these results compare to the minimum recommendations for Windows?

  What exactly makes server hardware so valuable or expensive

What exactly makes server hardware so valuable/expensive? What feature requirements drive the server market?

  Distinguish between local area networks wireless technologie

Identify hardware and software needed to secure your choice of networks against all electronic threats. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies.

  Examine the transmission line utilization

The packets are all transmitted on the same transmission line. It is unspecified that the packets have fixed lengths and are all equal, and that the transmission rate for the transmission line is fixed.

  Describe two network problems that can be solved

Describe two network problems that can be solved by replacing the workstations' 100 Mbps switches and NICs with 1000 Mbps switches and NICs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd